Nodogsplash offers a simple way to provide restricted access to an Internet connection using a captive portal. Pull requests are welcome!
This is a bugfix release.
This release has the following fixes and enhancements:
This is meant as a bugfix release for CVE-2023-39120
Version 5.0.0 has been forked from 3.3.2 in order to remove the FAS in a clean way. All patches from 4.5.1 has been backported.
Security release
This release adds significant new functionality yet is compatible with the previous version.
The most significant is the addition of support for https remote FAS. This is enabled using the configuration option to set fas_secure_enabled to level 3. The remote FAS will typically be situated on the Internet and have valid ssl certificates.
There are numerous other additions and fixes including documentation updates.
From the changelog:
Nodogsplash 4.4.0 release
This release adds significant new functionality yet is compatible with the previous version. The most significant is Client Network Zone detection. This allows FAS response to be dynamically tailored for each client depending on their connection to the network, mitigating the problems arising due to multiple instances of NDS not being supported on a single router. In addition to local "Zones", eg multiple wireless interfaces, this version also supports detection of remote 802.11s mesh gateways.
The second most significant addition of functionality is the implementation of an unescape callback for MHD that uses an unescape library script. The most obvious advantage of this is the removal of any restrictions on characters that can be used in user login form fields. Previously for example "+" and "&" could not be used. This was most noticeable in password fields. An additional advantage is that advanced developers are now able to tune the url-decode function provided by the unescape library script.
From the changelog:
Nodogsplash 4.3.3 release
This version fixes two issues that can cause NDS to lock or crash, one, a coding error that leads to memory corruption and two, deadlocks in iptables and ndsctl. Both of these issues occur at high loads and/or at high CPD detection rates.
In addition, in some circumstances, a deauthenticated client running a vpn may have suffered from querystring truncation causing vpn failure.
Some minor updates are also included.
Extract from changelog:
nodogsplash: Version 4.3.2
This release Fixes a Debian package build error
This did not effect the OpenWrt package.
There are no other changes from v4.3.1
Signed-off-by: Rob White [email protected]
Nodogsplash 4.3.1 release
This version provides the fix to an issue in Makefile, introduced in the previous version, that prevents the Debian package from being created.
This does not effect the OpenWrt package.
There are no other changes from v4.3.0
Signed-off-by: Rob White [email protected]